CAPEC-191

Read Sensitive Constants Within an Executable
Low
Draft
2014-06-23
00h00 +00:00
2022-02-22
00h00 +00:00
Alerte pour un CAPEC
Stay informed of any changes for a specific CAPEC.
Notifications manage

Descriptions CAPEC

An adversary engages in activities to discover any sensitive constants present within the compiled code of an executable. These constants may include literal ASCII strings within the file itself, or possibly strings hard-coded into particular routines that can be revealed by code refactoring methods including static and dynamic analysis.

Informations CAPEC

Prerequisites

Access to a binary or executable such that it can be analyzed by various utilities.

Resources Required

Binary analysis programs such as 'strings' or 'grep', or hex editors.

Related Weaknesses

CWE-ID Weakness Name

CWE-798

Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.

References

REF-51

Wikipedia
http://en.wikipedia.org/wiki/Decompiler

REF-52

Wikipedia
http://en.wikipedia.org/wiki/Debugger

REF-53

Wikipedia
http://en.wikipedia.org/wiki/Disassembler

Submission

Name Organization Date Date release
CAPEC Content Team The MITRE Corporation 2014-06-23 +00:00

Modifications

Name Organization Date Comment
CAPEC Content Team The MITRE Corporation 2015-11-09 +00:00 Updated Description Summary, Other_Notes, References, Related_Attack_Patterns, Resources_Required
CAPEC Content Team The MITRE Corporation 2017-08-04 +00:00 Updated Attack_Prerequisites, Description Summary, Resources_Required
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Weaknesses
CAPEC Content Team The MITRE Corporation 2020-07-30 +00:00 Updated @Name, Description, Related_Attack_Patterns, Taxonomy_Mappings
CAPEC Content Team The MITRE Corporation 2022-02-22 +00:00 Updated Description, Extended_Description